Resubmissions

03-09-2024 18:48

240903-xf68javepg 10

03-09-2024 04:15

240903-et8z6syajf 10

Analysis

  • max time kernel
    207s
  • max time network
    216s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-09-2024 18:48

General

  • Target

    BTC.exe

  • Size

    1.1MB

  • MD5

    f1424e5b9810a4a9c33506aa784fca89

  • SHA1

    4ad6287fe149832551afbcb1113db50cd133777b

  • SHA256

    8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed

  • SHA512

    e03432137a7c12c03d34302fe4e1774a3a08935d39f665e4086fd8637f4ea961a645e2a8bb3cd85dd24c54861e4f01b0500a70641e2fa3a4a09e2e89a3b77380

  • SSDEEP

    12288:JYYjzzONcuuIYsYNeaCbU6sKySaVQ4pBgncu7EKHCBbsCU/hpgmxCBbsCUXEGnF9:eg9uurUngnBU97EniCUppoiCUXfF9

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

185.252.232.158:7812

64.23.232.116:7812

Mutex

vsvf

Attributes
  • delay

    1

  • install

    true

  • install_file

    Windows Security Health Service.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

Version

5.0

C2

146.190.29.250:7812

165.227.91.90:7812

167.99.94.206:7812

Mutex

4chIqEbR5Rq6U6EI

Attributes
  • Install_directory

    %AppData%

  • install_file

    Windows Defender Service Host.exe

  • telegram

    https://api.telegram.org/bot7074211690:AAFHdtGIEk1j3FpHjh6_p8Xjh9rfZDo4uSc/sendMessage?chat_id=6291749148

aes.plain

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot7479631857:AAFuIUMNJYKHzJ3Bc9t4FSh9ZQXlqymhFnk/sendMessage?chat_id=6291749148

https://api.telegram.org/bot7074211690:AAFHdtGIEk1j3FpHjh6_p8Xjh9rfZDo4uSc/sendMessage?chat_id=6291749148

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain
aes.plain

Extracted

Family

quasar

Version

2.1.0.0

Botnet

Office04

C2

146.190.29.250:7812

Mutex

VNM_MUTEX_h1gQxrpyccCFZq7JPS

Attributes
  • encryption_key

    V5fWyT4tQqXFouaUUxe2

  • install_name

    Windows Security.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Update

  • subdirectory

    SubDir34

Extracted

Family

gurcu

C2

https://api.telegram.org/bot5904946097:AAEb_US4tHY3ko2z9Y7a20zEv4AtQqZipKM/sendMessage?chat_id=5881759996

https://api.telegram.org/bot7074211690:AAFHdtGIEk1j3FpHjh6_p8Xjh9rfZDo4uSc/sendMessage?chat_id=6291749148

https://api.telegram.org/bot7479631857:AAFuIUMNJYKHzJ3Bc9t4FSh9ZQXlqymhFnk/sendMessage?chat_id=6291749148

https://api.telegram.org/bot7479631857:AAFuIUMNJYKHzJ3Bc9t4FSh9ZQXlqymhFnk/sendDocument?chat_id=629174914

https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendDocument?chat_id=109642586

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Contains code to disable Windows Defender 2 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 2 IoCs
  • Gurcu, WhiteSnake

    Gurcu is a malware stealer written in C#.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 4 IoCs
  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Async RAT payload 3 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops file in Drivers directory 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 16 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 14 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Drops file in System32 directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 38 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 4 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\BTC.exe
    "C:\Users\Admin\AppData\Local\Temp\BTC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Users\Admin\AppData\Roaming\crack.exe
      "C:\Users\Admin\AppData\Roaming\crack.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4256
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6A4E.tmp.cmd""
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4376
        • C:\Windows\SysWOW64\timeout.exe
          timeout 4
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:2228
    • C:\Users\Admin\AppData\Roaming\Cracked.exe
      "C:\Users\Admin\AppData\Roaming\Cracked.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3604
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1400
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"'
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:5012
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp680C.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\Windows\system32\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:4824
        • C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe
          "C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1712
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2364
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Wi-Fi Discovery
        PID:3340
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1384
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show profile
          4⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:3772
        • C:\Windows\SysWOW64\findstr.exe
          findstr All
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3196
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4408
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4816
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show networks mode=bssid
          4⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:3576
    • C:\Users\Admin\AppData\Roaming\update.exe
      "C:\Users\Admin\AppData\Roaming\update.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4752
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Wi-Fi Discovery
        • Suspicious use of WriteProcessMemory
        PID:3876
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3968
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show profile
          4⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:3496
        • C:\Windows\SysWOW64\findstr.exe
          findstr All
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2992
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
        3⤵
        • System Location Discovery: System Language Discovery
        PID:440
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3148
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show networks mode=bssid
          4⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:3360
    • C:\Users\Admin\AppData\Roaming\Window Security.exe
      "C:\Users\Admin\AppData\Roaming\Window Security.exe"
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Checks computer location settings
      • Executes dropped EXE
      • Windows security modification
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:644
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Window Security.exe" /rl HIGHEST /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:4828
      • C:\Users\Admin\AppData\Roaming\SubDir34\Windows Security.exe
        "C:\Users\Admin\AppData\Roaming\SubDir34\Windows Security.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2220
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir34\Windows Security.exe" /rl HIGHEST /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:3724
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-MpPreference -verbose
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2324
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4228
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1516
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eG7JO7HrQuUg.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5300
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5356
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 10 localhost
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:5372
        • C:\Users\Admin\AppData\Roaming\Window Security.exe
          "C:\Users\Admin\AppData\Roaming\Window Security.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:5864
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1S0tEizOmqEh.bat" "
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1568
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1896
            • C:\Windows\SysWOW64\PING.EXE
              ping -n 10 localhost
              6⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:1104
            • C:\Users\Admin\AppData\Roaming\Window Security.exe
              "C:\Users\Admin\AppData\Roaming\Window Security.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:3376
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eNxlD1sQeQqP.bat" "
                7⤵
                • System Location Discovery: System Language Discovery
                PID:5336
                • C:\Windows\SysWOW64\chcp.com
                  chcp 65001
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4980
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 10 localhost
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:5220
    • C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe
      "C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3696
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Defender Service Host" /tr "C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4088
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4560
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4440,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=4140 /prefetch:8
    1⤵
      PID:3192
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4052
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
        PID:3520
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:3340
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
          1⤵
            PID:3876
          • C:\Windows\system32\taskmgr.exe
            "C:\Windows\system32\taskmgr.exe" /4
            1⤵
              PID:1920
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe"
              1⤵
              • Enumerates system info in registry
              • Modifies data under HKEY_USERS
              • Modifies registry class
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:5396
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffd3266cc40,0x7ffd3266cc4c,0x7ffd3266cc58
                2⤵
                  PID:5464
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2132,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2128 /prefetch:2
                  2⤵
                    PID:5668
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1832,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2224 /prefetch:3
                    2⤵
                      PID:5676
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1860,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2332 /prefetch:8
                      2⤵
                        PID:5684
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:1
                        2⤵
                          PID:5848
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3312,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3200 /prefetch:1
                          2⤵
                            PID:5856
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4580,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3720 /prefetch:1
                            2⤵
                              PID:6032
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4408,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4896 /prefetch:8
                              2⤵
                                PID:3604
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5024,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5080 /prefetch:8
                                2⤵
                                  PID:5356
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4404,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5300 /prefetch:1
                                  2⤵
                                    PID:2500
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4040,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5164 /prefetch:1
                                    2⤵
                                      PID:5336
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3380,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5252 /prefetch:1
                                      2⤵
                                        PID:4712
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3332,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5172 /prefetch:1
                                        2⤵
                                          PID:4548
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=3284,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3236 /prefetch:1
                                          2⤵
                                            PID:4100
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5380,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5508 /prefetch:1
                                            2⤵
                                              PID:3440
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4388,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3400 /prefetch:1
                                              2⤵
                                                PID:3880
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=3392,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3384 /prefetch:1
                                                2⤵
                                                  PID:1668
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3276,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3212 /prefetch:8
                                                  2⤵
                                                    PID:4064
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5128,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4896 /prefetch:1
                                                    2⤵
                                                      PID:5228
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3376,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3212 /prefetch:8
                                                      2⤵
                                                        PID:5332
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5140,i,5684912261190594393,11210470258745332012,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5560 /prefetch:8
                                                        2⤵
                                                        • Drops file in System32 directory
                                                        PID:4064
                                                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                      1⤵
                                                        PID:6000
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                        1⤵
                                                          PID:2080
                                                        • C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe
                                                          "C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe"
                                                          1⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:5316
                                                        • C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe
                                                          "C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe"
                                                          1⤵
                                                          • Executes dropped EXE
                                                          PID:1500
                                                        • C:\Windows\system32\taskmgr.exe
                                                          "C:\Windows\system32\taskmgr.exe" /4
                                                          1⤵
                                                            PID:1492
                                                          • C:\Windows\System32\rundll32.exe
                                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                            1⤵
                                                              PID:1088
                                                            • C:\Program Files\7-Zip\7zG.exe
                                                              "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\ProcessExplorer\" -spe -an -ai#7zMap1001:92:7zEvent2036
                                                              1⤵
                                                                PID:400
                                                              • C:\Users\Admin\Downloads\ProcessExplorer\procexp.exe
                                                                "C:\Users\Admin\Downloads\ProcessExplorer\procexp.exe"
                                                                1⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2172
                                                              • C:\Users\Admin\Downloads\ProcessExplorer\procexp.exe
                                                                "C:\Users\Admin\Downloads\ProcessExplorer\procexp.exe"
                                                                1⤵
                                                                • Executes dropped EXE
                                                                PID:6016
                                                              • C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe
                                                                "C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe"
                                                                1⤵
                                                                • Executes dropped EXE
                                                                PID:1956
                                                              • C:\Users\Admin\Downloads\ProcessExplorer\procexp64.exe
                                                                "C:\Users\Admin\Downloads\ProcessExplorer\procexp64.exe"
                                                                1⤵
                                                                • Drops file in Drivers directory
                                                                • Sets service image path in registry
                                                                • Executes dropped EXE
                                                                • Enumerates connected drives
                                                                • Checks processor information in registry
                                                                • Suspicious behavior: LoadsDriver
                                                                • Suspicious use of SendNotifyMessage
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:5992

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Users\Admin\AppData\Local\9a7d8ba08df952c93e9cf5f3b54e1a84\msgid.dat

                                                                Filesize

                                                                4B

                                                                MD5

                                                                bc2ba6bff2342259d8fb150b02dc1565

                                                                SHA1

                                                                c267645a02d0901147b7bc4a2b98868cd2e8c1da

                                                                SHA256

                                                                67bf76baa415c1861d4453d4e46e61e071f8bf29802c6730ef4830d8775ba871

                                                                SHA512

                                                                185506f3c90d03c0acc3cba35c5c9ad4ea9a6e17d4b51cd94512f5dc813a7c5854db7742c4c899f338de56e69854932ba8782fcdfe8c36c96c8357343866dbc9

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                Filesize

                                                                649B

                                                                MD5

                                                                3eaaa4b75ebeb8949d94a3350d1a545d

                                                                SHA1

                                                                53ecea645827a47f9fd070fde0ae87fd1f846354

                                                                SHA256

                                                                0c40284e9c6bb3d032a64cccaaedd32db46a6ad572c4b3920919d39b8cbebe95

                                                                SHA512

                                                                2395514f5c60b498f709a769da56a31857cf225e7870efe4821a0d8664a4c981d537195375c7b17776413dd8c207d0e4727e36a813f949e57a72f18917428561

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001

                                                                Filesize

                                                                211KB

                                                                MD5

                                                                e7226392c938e4e604d2175eb9f43ca1

                                                                SHA1

                                                                2098293f39aa0bcdd62e718f9212d9062fa283ab

                                                                SHA256

                                                                d46ec08b6c29c4ca56cecbf73149cc66ebd902197590fe28cd65dad52a08c4e1

                                                                SHA512

                                                                63a4b99101c790d40a813db9e0d5fde21a64ccaf60a6009ead027920dbbdb52cc262af829e5c4140f3702a559c7ac46efa89622d76d45b4b49a9ce01625ef145

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000f

                                                                Filesize

                                                                39KB

                                                                MD5

                                                                074d7c0ab0352d979572b757de8b9f0c

                                                                SHA1

                                                                ca7dd3b86c5e8a750401b8d6d773a9cc3af55b81

                                                                SHA256

                                                                46a06c3ec01cd4c5d5d8bb131febc48e3b1eeac94a47fe0718dfce6af821f83a

                                                                SHA512

                                                                00de9f645ca784322b005c73302aa573ab0665e8334533e7408326f0c84c12f3d056f39a2197d5c4bb8092f3b09dec4b79ec73de1b5d161951c5c48b9548216d

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\temp-index

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                0f89b771d5db7546546570f4d5850026

                                                                SHA1

                                                                d608b0571e40b82a263763a11402c78227741683

                                                                SHA256

                                                                ef56bd060fc941672a8422e8051a66785957670df61fd505b96d24fd0b17ea78

                                                                SHA512

                                                                286807d4a79aa0e16041395a63f5e821eec5acbd72cbfe31d2bf30cd049b45da715cbbd91d3ea3723131663ae5f2d9ae31e1a14b051be3ec60a0a14ccd813fea

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\temp-index

                                                                Filesize

                                                                216B

                                                                MD5

                                                                7d6b57be9d31aa21605626634b469838

                                                                SHA1

                                                                f052d88b822e4b7e27f214b2f8c4e9fe6271aacc

                                                                SHA256

                                                                7c7330ced8989c466e252aca469d6ad6059c894b2118a4e54cf1794f20bb1495

                                                                SHA512

                                                                255b66feeffba4f56212950fd2e77f5b6f9aed0894e6a4d9b0db6d2603dbb522ff1ec16085eae18c9e262fe3ca73aa98414fdb964e420227b790be6a79b542c7

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                                                Filesize

                                                                264KB

                                                                MD5

                                                                c6a3346408976fa2a0ceddb028af2dc4

                                                                SHA1

                                                                711cdb208d1a0b6b5e948a7cd1688cb70f9cf6d5

                                                                SHA256

                                                                df02cea129e551f76d6b2c9953c53caf81a869e59e8f09a6ae04c26ef77760a0

                                                                SHA512

                                                                322f181d8a094750ae3c537782a24dd9bfb6e3a3db02ab5036094857047b57b21fca64ef0d2e7a5264d9a7d4846074d97584b695576664426bc39415bae5f26e

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\t\Paths\CURRENT

                                                                Filesize

                                                                16B

                                                                MD5

                                                                46295cac801e5d4857d09837238a6394

                                                                SHA1

                                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                SHA256

                                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                SHA512

                                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                7070f533fa9480eb590c42f96590695c

                                                                SHA1

                                                                2d22251ab18ea68b6e54974f66245a693a6501da

                                                                SHA256

                                                                e0a04a523276a83067727d80fc613677350cca62f0b9812ba14892cfafa5c3f4

                                                                SHA512

                                                                5259bcda9191ba51a987120db8baeb069efe9e3577ca342e44a68d9bb6f4672a77c5f1b2991fceeb67bc071f58a34ec76453ba0425a780b01f961a8825f5f9ef

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                Filesize

                                                                4KB

                                                                MD5

                                                                fab51f3f5dfcc1c29d23321101a3c0d4

                                                                SHA1

                                                                05925f8af0b725e9fbe9849a201206cb40c3e196

                                                                SHA256

                                                                f0f8ce371b161b7c059cbbecbd0529e809b52557f5eb4e6a48c81a4daeec06b3

                                                                SHA512

                                                                d7eca435e9dc0953f1fb09d4802e5f7651f76321f511fd0d522a8d888ee3e421f2a5b292d08d7cf6a9bb2db809e77ca7712a4f896ecb1c18564edfdec602ed97

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                Filesize

                                                                2B

                                                                MD5

                                                                d751713988987e9331980363e24189ce

                                                                SHA1

                                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                                SHA256

                                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                SHA512

                                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                Filesize

                                                                690B

                                                                MD5

                                                                fd47bffaf7035d369f61fdaf9f96dbad

                                                                SHA1

                                                                4e396fa90e78e421ef9d3269b780cfb8e9585f36

                                                                SHA256

                                                                4507d64806015e51b2403773e8d8f670ec2b23f7497235569ac6e165eaa1f8b5

                                                                SHA512

                                                                15862ec9ed0549673e77c7123bbc773458de94f3ab0a2e198117f8465ceeeaf91e1b030f0a22350268386ef95c6d801fe6ca5311f00c78c3ef082a720e235929

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                ddc8b720767ad5a92d18ef4b958f1d9f

                                                                SHA1

                                                                a57dcd51c872df6be6773fdf8eaaed4ffa070ae1

                                                                SHA256

                                                                12275c70d13122b9e94671016bb4af558e47bf651c73b7d3a7928e6f977609fd

                                                                SHA512

                                                                694afbd53b624ea60d55d6caed5aff5ec541c2c57410e1dd5de945fcfe97835a995de75199482473415e6348c0aa123a7cb07d8ba1c1a2eac706df7a143f7f11

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                614e47aa5f9e685f99ffbcb3672e2f13

                                                                SHA1

                                                                540507905018251f86463e9fae17526cdd79442c

                                                                SHA256

                                                                a9123e57819aeab40098224754db144ac1aa488e18f59458ac88dd2d4336aa46

                                                                SHA512

                                                                198c0408372dbc5f2837c4c36d9db18ac5b6189f237f6edd196164b46c62c608010cca471e77aeb9f63119f7714fe1a43305544b6cdf878d67748bc1e60ddea8

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                3a35870d9ccb5c3e42b0bb014225f066

                                                                SHA1

                                                                824267693437b4d8c0966d3886d09bd9b73382d4

                                                                SHA256

                                                                ea75cc61a4761b37f7b65c56806482642a1a881ee210600e487a4d04a68e92a7

                                                                SHA512

                                                                3d465fb733e527c7427ab2f4beda86320168a8fa12142f328edfe3e83da585966bf372ae2bf7a2207bf1dbbde44f8171946d38806c589acdd075724ead31d69a

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                7c4a0361747260d544cf7a3422193a33

                                                                SHA1

                                                                04c6978538c5d4682c0c01222ccf5114bb15b60c

                                                                SHA256

                                                                b2e43fe0f48eb8233d36218f5a4e17210aa1ef7765917791d735b5415046eba5

                                                                SHA512

                                                                a3efd56912b6db19bb3d0e94cbee23ba55de7db442705a083d773b9c378297c7266f55b9a5d9c1277abb3c7d2109a5548542f8f624158ffa434c8015a08abd11

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                6a43bdac8e8f819afedd6e3327dfbdfe

                                                                SHA1

                                                                76f65074ca8b62c81246368896149e2697c10ad0

                                                                SHA256

                                                                0d75c8091114bd7a08e2fdd5385e28683b60f02a628e3a4df9b433990b8c5acf

                                                                SHA512

                                                                7dc6ff78f19682696a92a8098a3fe9e6217b93574709bf1cf7912335e596903b11e810e0ffe6d20a9870d378971c571402ca3df2406066d822ae5241b106c62e

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                Filesize

                                                                356B

                                                                MD5

                                                                077b87a5adbb34050101201b8174ed6e

                                                                SHA1

                                                                482a54ac6d1b99b2e19a20fbdb9efc576bc06528

                                                                SHA256

                                                                7b3370bbe89df54013ec95f6cf57ecaf43ee4e0152cee202a0b1884e72f6ce2f

                                                                SHA512

                                                                4a61c48ec5fa46f21360e35aae159ea7e498b8a0073f370ec269a9028e6f4aa4f424385d1294033f9b16710908cd11aeb158ab54f4af2825f6c98475e56dcbbd

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                71245545c8f0653d986ea46acd845d29

                                                                SHA1

                                                                5bb9dc62705b53b449858dc52ebcf7b65d73d1ee

                                                                SHA256

                                                                1366005c2cbe70a7bc694fb1ef473309edc4abd55ec6de7cd2fa954edff94c0b

                                                                SHA512

                                                                71e8382fd7f051dab3d22d4c73d1bc3b2a7fb1f0cae95e96ee4a4e46b3f05cc0aa4668cd8600bed559dee3bd2b827cbf60c164aa0d710d18b2245c18319ef8e0

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                cd2075cb4467553e7ea545cc223ba716

                                                                SHA1

                                                                d6f23c08618caa5b6eee516672bfb008f9f54a4f

                                                                SHA256

                                                                88acef49374f2242e635b0e71aa705add66f2892512e9bb421e2736b36ad2270

                                                                SHA512

                                                                b0f4ab5ac74b605fb6ff877859338ed268e2a7a998ffce564492e937847348acf2de733d8230fbd56e26c29466eec5647d4aabd058d6bd55dfdaf963ede39bab

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                dfb9e76689b1e47f864bedb982bf617e

                                                                SHA1

                                                                1ee31f89bb442f59cced6ca3f2fe70df747439e4

                                                                SHA256

                                                                26935918133834580601b69393b03643cb5ccefce03926deb36beb1e9a01e376

                                                                SHA512

                                                                f440457f0c68917decb53b56da7a487b64d18a2e2827cc9483df3189f526b8e5612f219560fa48fc86791ffbc72fbf961e071ee8be3354cd8fbd1529a698e06f

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                10KB

                                                                MD5

                                                                317c8bf4b41da34afe607361e696afa6

                                                                SHA1

                                                                88ea78749f26a75c0c6bceb11efe2a3873537888

                                                                SHA256

                                                                373dbcae5440649a7ff4bbfc1b05d69ece922388460cd16e892bfcfb57d7657a

                                                                SHA512

                                                                b901872e53a8884f75d161f8a459be64b55b468fc2ef65cad0ac0aef00b7f240ec77045558a686cfde1c8ec48687760ba1be6f4c29b2817a3ed723e9856c29ff

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                10KB

                                                                MD5

                                                                df7c052446bc315c11652d95a1a20b54

                                                                SHA1

                                                                6cbde65b032348e2e038c2bff002fff670857a45

                                                                SHA256

                                                                dd41ceda43d96670a56dc54bbee91aa3ded85037f105f1367f3e8156d080a184

                                                                SHA512

                                                                e9e6a1a4d39650d51e059d34f01765a8f1631a5a930779c4b87176d9805c8b432bb38c322c038cde816b76280bfba5d1acdc9bd1aad859777277852887fb0df6

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                10KB

                                                                MD5

                                                                a55502b37a06c4985546d9e7a9748281

                                                                SHA1

                                                                97027fe2c6d412d2bb0652ccd26fbe06c303ad96

                                                                SHA256

                                                                c93af40015ee1c3c23ac540bcc2d99c093c8502684b439aee9bf222dccc3201b

                                                                SHA512

                                                                0c1cca5fdd2cd88e1cea1579b6f332ee90f59374fac8924d4c2e66dac9740044b998f40c22c1e7217c70d175e7a6c7a43c7ff0fe056abb454b4b130a2b0c1f4e

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                10KB

                                                                MD5

                                                                659038c9f0b8fbfade654b1645f11d4c

                                                                SHA1

                                                                6f8efe9e4401a303f4ea9199edade4d26260367c

                                                                SHA256

                                                                57e968cfc573a7beb2e6e403bf153268c801be5a421512f5705f6a03254f4211

                                                                SHA512

                                                                4a1469f101046c80c4fc896f116bc9f849f4c06908abab9b1fd4f25b41233be0ffc4eb32d00feec963a19aa9efbd915f1dd1dc0a940b8a84c7b7531f1cd5d647

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                11KB

                                                                MD5

                                                                bdc297cfcce4d61b5487764643db74fb

                                                                SHA1

                                                                95fffaf44ff0cb98bde53777c67420582789daf8

                                                                SHA256

                                                                6bebaa2b4d170999c809631eeaa4b0464ab0835e5a6074e117b47140c9b1336a

                                                                SHA512

                                                                e9c86268abb5a4e551c8d45ce687514bc7068516b91637215a4807f1aae5703c67c8a2d619e40df98131e6590df2953742de0c27a7817f875ac991662abd9fac

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                be5eb6e20c0e9467d314478d167dfca9

                                                                SHA1

                                                                5bea7c107678c5489561eaab33e0296d0addcf82

                                                                SHA256

                                                                2ffd655e27363e0a7a6d62af604bdc7d8eb8186f6fc6eef5f65a1748238f2cc7

                                                                SHA512

                                                                10ef0b4198a35db1ecbdaac135378d760879fdfffda1a1a8a36a819dd43774a59b685cc146c880e411cbdd15b80db939729809fe3dba5057220a7fae9fd5e1cd

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                9610b327f51650ae751fb3ce6af85000

                                                                SHA1

                                                                4a2be8d35b6c3dc20004b655e28cc036b216d40b

                                                                SHA256

                                                                352ecac39c738e5574c1749f0a1003e52e552a3ddf945bc5b990cde7009c5470

                                                                SHA512

                                                                8ad7b03cb3f161d6172b57ef6cb190e0bdfe49516f6438285bd93c2a6c2a92d609a29c8d3e6692ecea3859e1391e7443886c3a8f7e9acb0e5e3a4928de4cf93a

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                Filesize

                                                                15KB

                                                                MD5

                                                                51655d32e01facf2acd0302870b3e020

                                                                SHA1

                                                                330f9af178a6888c0d7c919e844e3c1bf6dc6ac3

                                                                SHA256

                                                                e44ec10b5fd346e856153415184f0c2e00b84ef7589cb31cfdc2c41b69490391

                                                                SHA512

                                                                fa62b5b354b1c4db9afc7d21792f4e6d8113ed6e53d0ffa5b2fe410d4adadf2f768090ba8536ef71a0a9c5cc24acbfe7c510663c10a181996b2cb9a20011a5c9

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                Filesize

                                                                204KB

                                                                MD5

                                                                91b218dfb6d2fa18f75a655747464843

                                                                SHA1

                                                                8b57f0410dc8eb0d31991e1e291d5d97f35d4fac

                                                                SHA256

                                                                6fd0c8d0d8d79fceeb9419b83209a3fe9403d9ab1368300493a7a223d29a1034

                                                                SHA512

                                                                332616e1d84695fce70c1d0e81c077bdf2abb6dad56c32914d10e7d642fe07eb8be89759734b72d5bce11c1a4027948c1e383a84fe804f22497f2789412cf869

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                Filesize

                                                                204KB

                                                                MD5

                                                                2789a293db8b329e041d2992d2b49386

                                                                SHA1

                                                                09233b41f2979e924e29d4596b84d00961c191ea

                                                                SHA256

                                                                40b2bbfe00a0ec215ce2bda68a555db76c9b9c51f84fec82004c60330033ba92

                                                                SHA512

                                                                b0130df2ba98d257e7690138a30144405c4f52141090008a3f6f4e36e94673f380eccc291815bc6d56124b01193148809361ff0c1e1265b35e1595a4d2d026b3

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                Filesize

                                                                204KB

                                                                MD5

                                                                92d62dbe469a54ad1a408f248a5e54f5

                                                                SHA1

                                                                cb2146e8c303805bdb46f39b2dd5bb3362155bd3

                                                                SHA256

                                                                494fb329f3724395e94102ec67e2dfa63a835dc89ed5d36ac5a629f8acd24a1e

                                                                SHA512

                                                                bb753dd8e9632d313a376fcda6b17a4e79468fe23734d74fce18b9db6a0c90d0c57f6bc19c6b850890078649220f8a4b40c0a0b8a4c87647c4216cf82f716adc

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                Filesize

                                                                204KB

                                                                MD5

                                                                b1939e2522b95bd6a2d499c8fb304599

                                                                SHA1

                                                                0accd808928817c9ab26753d81e02c219efb8a0c

                                                                SHA256

                                                                7ec433a2a62906d06fb8db55d53c8f0a1f38b99d1eedfa14fa3338af226eaa55

                                                                SHA512

                                                                35ed156ac5653c455e7f5374a107988e9f64bd392ad5fa0e913c9104cf8dec92a5542a93a38d6aa937aef359e341d1d05aa2d9441339b63237c1791076f9acd3

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                Filesize

                                                                204KB

                                                                MD5

                                                                9a3569e36dd8b475cfec5a95e1688aef

                                                                SHA1

                                                                fdde1c4d060ef6561d4ba9921699c5db798eb5c6

                                                                SHA256

                                                                62f938b83f73c431d41c49c86bb4bbbcbe9fd270d5bab0955412747a4c7de163

                                                                SHA512

                                                                b3370a0c41507ca693e7542f30bbd6c9a7bb3ddae2a83596badf6a1fe6c551a49a5ce90c361079cbf60c78d0e06cc244b857c9383475eb2ca9011c2446a98073

                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Windows Defender Service Host.exe.log

                                                                Filesize

                                                                654B

                                                                MD5

                                                                2ff39f6c7249774be85fd60a8f9a245e

                                                                SHA1

                                                                684ff36b31aedc1e587c8496c02722c6698c1c4e

                                                                SHA256

                                                                e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                                                                SHA512

                                                                1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Window Security.exe.log

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                10eab9c2684febb5327b6976f2047587

                                                                SHA1

                                                                a12ed54146a7f5c4c580416aecb899549712449e

                                                                SHA256

                                                                f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928

                                                                SHA512

                                                                7e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50

                                                              • C:\Users\Admin\AppData\Local\Temp\1S0tEizOmqEh.bat

                                                                Filesize

                                                                209B

                                                                MD5

                                                                99fcf675a848e1a039d7fd150ef51931

                                                                SHA1

                                                                66a4bc43792d27f8c7e9a59e16640430b9533cef

                                                                SHA256

                                                                9224ca3556cee42350704432999d5ef867ce49422db5661b4f205fa80f25088a

                                                                SHA512

                                                                f8f98ea808e95950bd05a4daf3e0cf833d4b7f5a906dcbf06b19578f4e60cf3e95f543b5cfee9e3264ce67229975e2dbf55c986ee13b69413e075c14d395c6c7

                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_r3f2zapk.zxu.ps1

                                                                Filesize

                                                                60B

                                                                MD5

                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                SHA1

                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                SHA256

                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                SHA512

                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                              • C:\Users\Admin\AppData\Local\Temp\eG7JO7HrQuUg.bat

                                                                Filesize

                                                                209B

                                                                MD5

                                                                50595965e458123460f5f33295af64b2

                                                                SHA1

                                                                4b279cf82e08d2072da9a3f62afd4283f71b1932

                                                                SHA256

                                                                11fa3aa5177e4c7e6fb05f3f4ca6068b65c42dd48b4fc621bb897fc580eedaf0

                                                                SHA512

                                                                d60c02ed4e4f602c456c2c02960e5e85ce716dbea656e96f483f020e034c91f854c00cca6c12983698bdf20b98a5890e5093d708a2b09f2e7228533e76e95ca2

                                                              • C:\Users\Admin\AppData\Local\Temp\eNxlD1sQeQqP.bat

                                                                Filesize

                                                                209B

                                                                MD5

                                                                282b14648e4cbca3d313265edcc923c6

                                                                SHA1

                                                                11037e6f2f1b54f9a7d3728ab40609d2bcc2b882

                                                                SHA256

                                                                c3ef94cd4928fdcff05070d573441447f8eafa82e624d2f34411c3fcdde9635c

                                                                SHA512

                                                                620046faccbd315fb3016ae980fe92238bda5896cdd671a2ac9ad6a321c76c0d05ed8a683bf65b02551c3182863178fa1a983773f5bdf5fe73bbbeb17ca83d22

                                                              • C:\Users\Admin\AppData\Local\Temp\places.raw

                                                                Filesize

                                                                5.0MB

                                                                MD5

                                                                5e85df8ce7f472220deb45090179b5ca

                                                                SHA1

                                                                ea98605242ca81d51eb887776858b36c5aafa43f

                                                                SHA256

                                                                0c57d343a8ba1d51f4f54eccfb49fadb783da48574c9642b214ffdf491c802ec

                                                                SHA512

                                                                c8f7d81db2709881c0cc837283ee829e27e0a0694f51448ca6608dbdaba607851d2d43f503f86ffd8312cbaff97a164c29bd82f36f04252d405d8bb2814dbb8a

                                                              • C:\Users\Admin\AppData\Local\Temp\tmp680C.tmp.bat

                                                                Filesize

                                                                175B

                                                                MD5

                                                                f308b6cfa1112743707da4d07e7a0343

                                                                SHA1

                                                                51fd4c92e4c2c01870174e39d4cdfc0bb832d4e9

                                                                SHA256

                                                                54d01fb2127222a5c8234994a5d2ba91eaf76b35ced8ec946745c791c33a6042

                                                                SHA512

                                                                787e282a8b3042a58ffce9689f512175af3bd1a6f44f04501ca44d3ba83d9d1a38f75f6a473c1c3b0b8183dc6243e223b54ea1970edff8c4437f112ecb9a55af

                                                              • C:\Users\Admin\AppData\Local\Temp\tmp6A4E.tmp.cmd

                                                                Filesize

                                                                151B

                                                                MD5

                                                                1241a0fc4b38428fe8fbd3a93e952bb9

                                                                SHA1

                                                                4791b0aa5ed3ef8c408f3469eacaa68bca7aa0bb

                                                                SHA256

                                                                2fafb0aa3eeae225c77aa206a7ebf92ba7b1985241185fb77e13f4e3ae01259c

                                                                SHA512

                                                                50fac3ab45b28113c8ebc447d22a1684fda51261166275b2aa603658216d231a21121f4304b17b305f7b9233eef486ec811638ec218220abe55979f162701695

                                                              • C:\Users\Admin\AppData\Local\Temp\tmp8076.tmp.dat

                                                                Filesize

                                                                114KB

                                                                MD5

                                                                6e389da3969c19b6dbfb95013149bbb5

                                                                SHA1

                                                                f02ff8f1f1b353e36e4f609d39815c17eba8cee3

                                                                SHA256

                                                                4928d3109995b2faee203bc67184c892e9633fc7df6ad619f5852cf680c36ed4

                                                                SHA512

                                                                af965dc6aa1c26442f883e2d916509bc7766b425768e6a482223fdd1d3a5133c3b1955ad91bd578c387cc260efee4f738095d8ed7bafb7ed953edcc948313636

                                                              • C:\Users\Admin\AppData\Local\Temp\tmp8087.tmp.dat

                                                                Filesize

                                                                160KB

                                                                MD5

                                                                f310cf1ff562ae14449e0167a3e1fe46

                                                                SHA1

                                                                85c58afa9049467031c6c2b17f5c12ca73bb2788

                                                                SHA256

                                                                e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                                                                SHA512

                                                                1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                                                              • C:\Users\Admin\AppData\Local\Temp\tmp808A.tmp.dat

                                                                Filesize

                                                                232KB

                                                                MD5

                                                                90e4c8cb252946822fb8c59eac2f85a2

                                                                SHA1

                                                                b31c1508cc1bd48f269dd6dab335ce2bb0914832

                                                                SHA256

                                                                57f18c793b74df0632e258b4d17b74e0ad015d4ce68dfda1fd858d5700fb1237

                                                                SHA512

                                                                3a6864ffebf6fcdbca935dfbaf88894cce0fcd5da97fb5c386275799ed7f6d693d64de3a999786a95cc42a1d8daec91d7658c38817e289a03171d7e033b9c3a4

                                                              • C:\Users\Admin\AppData\Local\bc12c5b12918061caa4a8f7825168fa6\Admin@SYMRKCCU_en-US\System\Process.txt

                                                                Filesize

                                                                4KB

                                                                MD5

                                                                8668f8b4d67c6c63cd1504cfdb71200d

                                                                SHA1

                                                                dfb47bd498585917f3d900928e4da5a2acd832fa

                                                                SHA256

                                                                a27c218aafaca0a5bdf1458c48d7a3b900bc3f37ff39519c45988896d0948a52

                                                                SHA512

                                                                41183c0153cc2a772b636366455d9e7a349fcf4069c39d4cd01711605140af6cc5dafc683e6ee165fd501f5dbe6ffabe6f506846dd97eba953481b53876774cf

                                                              • C:\Users\Admin\AppData\Local\bc12c5b12918061caa4a8f7825168fa6\msgid.dat

                                                                Filesize

                                                                1B

                                                                MD5

                                                                cfcd208495d565ef66e7dff9f98764da

                                                                SHA1

                                                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                SHA256

                                                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                SHA512

                                                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                              • C:\Users\Admin\AppData\Local\e0e214b4d2b81ec03aca51fd1994fc50\Admin@SYMRKCCU_en-US\Browsers\Firefox\Bookmarks.txt

                                                                Filesize

                                                                105B

                                                                MD5

                                                                2e9d094dda5cdc3ce6519f75943a4ff4

                                                                SHA1

                                                                5d989b4ac8b699781681fe75ed9ef98191a5096c

                                                                SHA256

                                                                c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

                                                                SHA512

                                                                d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

                                                              • C:\Users\Admin\AppData\Local\e0e214b4d2b81ec03aca51fd1994fc50\Admin@SYMRKCCU_en-US\System\Process.txt

                                                                Filesize

                                                                4KB

                                                                MD5

                                                                6e0c834dc5eeb54bcd3709157e4a0697

                                                                SHA1

                                                                e0c3009ebc2f2452561df1b72af4760f2c0f67f0

                                                                SHA256

                                                                5918c637e97b7987d3fe56aaf25a024c3260148e5e12e614e9c8200a19b78cb3

                                                                SHA512

                                                                30bf3af888f770f1307ada52050054d64e3df27c536fb75f7e5344f77d2fc9e04c6166eea959b8a57da9cae11385c9bc1cf8d8cb6e62aeb59796e836fde09da3

                                                              • C:\Users\Admin\AppData\Roaming\Cracked.exe

                                                                Filesize

                                                                74KB

                                                                MD5

                                                                0dfa83a82f6418c73406d78296de61be

                                                                SHA1

                                                                dd7eceef8a434c43e0751e180bf714e08771d336

                                                                SHA256

                                                                8d27369ffa8b29d561fa9daf485be14d2fc00287bb1c69d4c84d514891c8db5e

                                                                SHA512

                                                                9a4b026250b18c29ab7dd48203f321c2ef2f12695bd2dcb52ebbc15001c8ddf019d5a7e04da056c50c1881ce269d1810259bf6d04b61f471e8751b7192fc73d4

                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender Service Host.lnk

                                                                Filesize

                                                                883B

                                                                MD5

                                                                7f954c219d03a9f440408d15834b8dd1

                                                                SHA1

                                                                9b9f5f31e62622ca32a9f11c4598c3a6febd9ca2

                                                                SHA256

                                                                d6389aefe3c29228f5d4fa3907934f25a7da023ea088a54b89a2b2a8bfecfaad

                                                                SHA512

                                                                b37e06bf8f4205c8a12886305529ecd22087e92a9e843b4b93fab52cd4c0a6810bf02467521ac849965602823e03bc0d5e85affebd82d1619e157755887164b7

                                                              • C:\Users\Admin\AppData\Roaming\MyData\DataLogs.conf

                                                                Filesize

                                                                8B

                                                                MD5

                                                                cf759e4c5f14fe3eec41b87ed756cea8

                                                                SHA1

                                                                c27c796bb3c2fac929359563676f4ba1ffada1f5

                                                                SHA256

                                                                c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761

                                                                SHA512

                                                                c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b

                                                              • C:\Users\Admin\AppData\Roaming\Window Security.exe

                                                                Filesize

                                                                534KB

                                                                MD5

                                                                81b2c5c64951b603480d40d321540ff2

                                                                SHA1

                                                                314199ad92baeb203f5555ff3814e9b7a4f226f8

                                                                SHA256

                                                                b893220d33f9b8a0f98702bb577e4459792253ae651bdc18a93145ccd008af54

                                                                SHA512

                                                                3a57655bf7aa18a34364659553aad26a3d5b8946b957441f5fedebab5936b6bb2c71c6337837ead486a001b6a9227437cc5c4ec4a5de627f0e2db10dc6afdea6

                                                              • C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe

                                                                Filesize

                                                                43KB

                                                                MD5

                                                                5322a12cb24e83bfa9746fbde06d07e7

                                                                SHA1

                                                                5263a4f26bda073e9f82dd4fa612eb494dd771c7

                                                                SHA256

                                                                4957d607c2984f94a258dba088fa1ab85e508bfaabe9279bf8b6bf6f4b97a9bb

                                                                SHA512

                                                                67bfaef1ddf4ad44218c82c5634e7f726304845fab1d5361353fdacd8d8d767fec32c871fa304f4199dde3f6224be76c67560a64c1d72bbe20e134c50d1bf058

                                                              • C:\Users\Admin\AppData\Roaming\crack.exe

                                                                Filesize

                                                                8KB

                                                                MD5

                                                                9215015740c937980b6b53cee5087769

                                                                SHA1

                                                                a0bfe95486944f1548620d4de472c3758e95d36a

                                                                SHA256

                                                                a5390a297f14ef8f5be308009ec436d2a58598188dbb92d7299795a10ba1c541

                                                                SHA512

                                                                5b9bbf1836466d803d3e160a38e10c8397aa3966c120ab6435a52b7d0a09eb664ef2172bf0e7e2de1cc3eae261167c9355fa7ac3b1b7e4504a7e07b82c4b90e2

                                                              • C:\Users\Admin\AppData\Roaming\svchost.exe

                                                                Filesize

                                                                170KB

                                                                MD5

                                                                96014694a042d8344b910bc47d79337b

                                                                SHA1

                                                                9d19ab2f110ae58f30965a5a3d608cbf51986edb

                                                                SHA256

                                                                4950eb74909bd6e739e38e57d8c6465c76ef108d65cac9f130d3f5c6d2fe943f

                                                                SHA512

                                                                fe308c42b3ad2c3d73a834399aa12ea23f336103389181dface80a81da8be1ffd9a950cac802dc8a806ad318eb90a6bb6021d1acd9206a07749f83f2bb6cd03d

                                                              • C:\Users\Admin\AppData\Roaming\update.exe

                                                                Filesize

                                                                225KB

                                                                MD5

                                                                b8df7316cc35a0fb6fe3a326b4283010

                                                                SHA1

                                                                d49c11f5a95f72e37d6194df41178f2b7faa01ee

                                                                SHA256

                                                                f243df692ee7552286d52b23e4993e07a27877aa86c63b84903a8e6cbd0d19f3

                                                                SHA512

                                                                3ef92be29123695820970a003fd0561a57f87c8c6adae86781729027ce40ede4b63da30d0b0cc75376bd9ae90accaf674fc7ff799a8b73ab4bb45b2ca65ff120

                                                              • C:\Users\Admin\Downloads\ProcessExplorer.zip.crdownload

                                                                Filesize

                                                                3.3MB

                                                                MD5

                                                                6c33b4937c5ed3f19f44cda1a9fe0bfc

                                                                SHA1

                                                                09ac5309b4d112d7cdb275572c28e3513748ad8c

                                                                SHA256

                                                                54336cd4f4608903b1f89a43ca88f65c2f209f4512a5201cebd2b38ddc855f24

                                                                SHA512

                                                                de2d46289164c77e7e5815d011164b48fe3e7394228a4ac2dd97b58a9ec68e306e7d18b18c45913fda9b80fed47607ea7600004e5fdffcda5b1362e71ad68056

                                                              • C:\Users\Admin\Downloads\ProcessExplorer\procexp.exe

                                                                Filesize

                                                                4.3MB

                                                                MD5

                                                                94c60e6704b5dd11a139f2ffebde9135

                                                                SHA1

                                                                cd89f1cf9428a3eab554a3eb9ff6ca869e5bc368

                                                                SHA256

                                                                106bf123359d03963b1df1011fb8560aaf1c5e811de775dce1d8a53758a69102

                                                                SHA512

                                                                586bf326eae890379fcc7ad60e0a70384d069898aea46da32baf6bd60854df97b461019beaf17744ba3dfc0e70eb75970b977c30f035d296ae89763605d4ff6d

                                                              • C:\Users\Admin\Downloads\ProcessExplorer\procexp64.exe

                                                                Filesize

                                                                2.3MB

                                                                MD5

                                                                dfeea73e421c76deb18d5ca0800dccf2

                                                                SHA1

                                                                0497eba0b24d0f4500faad5ae96dbebab9c64608

                                                                SHA256

                                                                8158dc0569972c10056f507cf9e72f4946600ce163c4c659a610480585cd4935

                                                                SHA512

                                                                23ddc9f28314d4cf3b05d88b9e0b6fd69f9804f5e9c3f7703258ff2c5786721061321379fde53e21048d3c7cce1ff71e2872d48dcc580d059397fa0692335630

                                                              • memory/644-81-0x0000000005C00000-0x0000000005C12000-memory.dmp

                                                                Filesize

                                                                72KB

                                                              • memory/644-88-0x0000000006700000-0x000000000673C000-memory.dmp

                                                                Filesize

                                                                240KB

                                                              • memory/644-80-0x0000000003060000-0x00000000030C6000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/644-79-0x0000000005520000-0x00000000055B2000-memory.dmp

                                                                Filesize

                                                                584KB

                                                              • memory/644-78-0x0000000005CB0000-0x0000000006254000-memory.dmp

                                                                Filesize

                                                                5.6MB

                                                              • memory/644-77-0x0000000000B50000-0x0000000000BDC000-memory.dmp

                                                                Filesize

                                                                560KB

                                                              • memory/2220-129-0x0000000006EA0000-0x0000000006EAA000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/2324-276-0x0000000007DB0000-0x0000000007DCA000-memory.dmp

                                                                Filesize

                                                                104KB

                                                              • memory/2324-273-0x0000000007CB0000-0x0000000007CC4000-memory.dmp

                                                                Filesize

                                                                80KB

                                                              • memory/2324-131-0x0000000070790000-0x00000000707DC000-memory.dmp

                                                                Filesize

                                                                304KB

                                                              • memory/2324-149-0x0000000007AE0000-0x0000000007AEA000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/2324-130-0x00000000076F0000-0x0000000007722000-memory.dmp

                                                                Filesize

                                                                200KB

                                                              • memory/2324-166-0x0000000007CF0000-0x0000000007D86000-memory.dmp

                                                                Filesize

                                                                600KB

                                                              • memory/2324-280-0x0000000007D90000-0x0000000007D98000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2324-148-0x0000000007A70000-0x0000000007A8A000-memory.dmp

                                                                Filesize

                                                                104KB

                                                              • memory/2324-206-0x0000000007C70000-0x0000000007C81000-memory.dmp

                                                                Filesize

                                                                68KB

                                                              • memory/2324-146-0x0000000007730000-0x00000000077D3000-memory.dmp

                                                                Filesize

                                                                652KB

                                                              • memory/2324-268-0x0000000007CA0000-0x0000000007CAE000-memory.dmp

                                                                Filesize

                                                                56KB

                                                              • memory/2324-114-0x00000000067F0000-0x000000000683C000-memory.dmp

                                                                Filesize

                                                                304KB

                                                              • memory/2324-113-0x0000000006730000-0x000000000674E000-memory.dmp

                                                                Filesize

                                                                120KB

                                                              • memory/2324-112-0x0000000006310000-0x0000000006664000-memory.dmp

                                                                Filesize

                                                                3.3MB

                                                              • memory/2324-111-0x0000000006230000-0x0000000006296000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/2324-110-0x00000000059D0000-0x00000000059F2000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2324-99-0x0000000005A50000-0x0000000006078000-memory.dmp

                                                                Filesize

                                                                6.2MB

                                                              • memory/2324-98-0x0000000002E40000-0x0000000002E76000-memory.dmp

                                                                Filesize

                                                                216KB

                                                              • memory/2324-141-0x00000000076B0000-0x00000000076CE000-memory.dmp

                                                                Filesize

                                                                120KB

                                                              • memory/2324-147-0x00000000080B0000-0x000000000872A000-memory.dmp

                                                                Filesize

                                                                6.5MB

                                                              • memory/2364-74-0x0000000000110000-0x0000000000140000-memory.dmp

                                                                Filesize

                                                                192KB

                                                              • memory/2364-493-0x0000000006BA0000-0x0000000006BB2000-memory.dmp

                                                                Filesize

                                                                72KB

                                                              • memory/2636-0-0x00007FFD3C6E3000-0x00007FFD3C6E5000-memory.dmp

                                                                Filesize

                                                                8KB

                                                              • memory/2636-1-0x0000000000C20000-0x0000000000D40000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/3604-87-0x00007FFD3C6E0000-0x00007FFD3D1A1000-memory.dmp

                                                                Filesize

                                                                10.8MB

                                                              • memory/3604-68-0x00007FFD3C6E0000-0x00007FFD3D1A1000-memory.dmp

                                                                Filesize

                                                                10.8MB

                                                              • memory/3604-76-0x00007FFD3C6E0000-0x00007FFD3D1A1000-memory.dmp

                                                                Filesize

                                                                10.8MB

                                                              • memory/3604-36-0x0000000000F20000-0x0000000000F38000-memory.dmp

                                                                Filesize

                                                                96KB

                                                              • memory/3696-72-0x00000000004A0000-0x00000000004B2000-memory.dmp

                                                                Filesize

                                                                72KB

                                                              • memory/4052-123-0x00000235A3880000-0x00000235A3881000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/4052-117-0x00000235A3880000-0x00000235A3881000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/4052-116-0x00000235A3880000-0x00000235A3881000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/4052-115-0x00000235A3880000-0x00000235A3881000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/4052-124-0x00000235A3880000-0x00000235A3881000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/4052-122-0x00000235A3880000-0x00000235A3881000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/4052-121-0x00000235A3880000-0x00000235A3881000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/4052-127-0x00000235A3880000-0x00000235A3881000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/4052-126-0x00000235A3880000-0x00000235A3881000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/4052-125-0x00000235A3880000-0x00000235A3881000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/4256-73-0x0000000000130000-0x0000000000138000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/4752-75-0x0000000000EB0000-0x0000000000EEE000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4752-480-0x00000000063E0000-0x00000000063EA000-memory.dmp

                                                                Filesize

                                                                40KB